Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Vulnerabilities
CSSLP 2019
| Intermediate
- 20 videos | 1h 21m 20s
- Includes Assessment
- Earns a Badge
Explore how to identify and assess security vulnerabilities in this 20-video course, in which you will encounter essential secure coding techniques such as versioning, peer-based code reviews, code analysis, and anti-tampering techniques. First, become familiar with malicious practices and the threats outlined in the Open Web Application Security Project (OWASP) Top 10 list and the Common Weakness Enumeration (CWE) list of software weaknesses. You will soon be able to differentiate between CWE and Common Vulnerabilities and Exposure (CVE) lists. Next, learn to describe the characteristics of injection attacks, before watching demonstrations of input validation failures such as buffer overflows, canonical form, missing defense functions, and general programming failures. You will examine how to analyze reuse code for security vulnerabilities, identify malicious code, securely reuse third-party code, and securely integrate components. Finally, learners will hear discussions of defensive coding, side channels, social engineering attacks, source code and versioning. The course prepares learners for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courselocate and list the OWASP "Top 10"locate and list the CWE list of software weaknessesdescribe characteristics of injection attacksrecognize input validation failures such as buffer overflow, canonical, missing defense functions, and general programming failuresdifferentiate between common weakness enumerations and common vulnerabilities and exposuredescribe side channelsdescribe social engineering attacks such as phishingidentify source code and versioning best practicesidentify build environment best practices such as anti-tampering techniques and compiler switches
-
recognize characteristics of peer-based code reviewsdistinguish between static and dynamic code analysislist the steps for code signinganalyze reused code for security vulnerabilitiesdifferentiate between static and dynamic analysissearch for and identify malicious codesecurely reuse third party code or librariesrecognize how to securely integrate components such as systems of systems integrationdebug security errorssummarize the key concepts covered in this course
IN THIS COURSE
-
2m 24s
-
7m 1s
-
3m
-
9m 6s
-
7m 16s
-
4m 32s
-
2m 9s
-
5m 24s
-
4m 34s
-
3m 32s
-
3m 59s
-
2m 39s
-
5m 1s
-
2m 19s
-
5m 26s
-
2m 27s
-
1m 55s
-
1m 57s
-
4m 56s
-
1m 42s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.